Browsing PhD and MSc Theses- Faculty of Information Technology by Issue Date
Now showing items 21-40 of 124
-
Arabic Typed Text Recognition in Graphics Images (ATTR-GI)
(الجامعة الإسلامية - غزة, 2013)While optical character recognition (OCR) techniques may perform well on standard text documents, their performance degrades significantly in graphics images. In standard scanned text documents OCR techniques enjoy a number ... -
A High Performance Parallel Classifier for Large-Scale Arabic Text
(الجامعة الإسلامية - غزة, 2013)Text classification has become one of the most important techniques in text mining. It is the process of classifying documents into predefined categories or classes based on their content. A number of machine learning ... -
Automatic Ontology-Based Document Annotation for Arabic Information Retrieval
(الجامعة الإسلامية - غزة, 2013)The r R apid d D evelopment s in the semantic search technology give s motivation to build an efficient and scalable document annotation and retrieval techniques. Most existing methods and techniques in the field of document ... -
An Improved Multi-Level Edge-Based Stereo Correspondence Technique for Snake Based Object Segmentation
(الجامعة الإسلامية - غزة, 2013)Disparity maps generated by stereo correspondence are very useful for stereo object segmentation because based on disparity background clutter can be effectively removed from the image. This enables conventional methods ... -
abnormal network trafic detection based on clustering and classification techniques dos case study
(الجامعة الإسلامية - غزة, 2013) -
enhanced context aware role based access control framework for pervasive environment
(الجامعة الإسلامية - غزة, 2014) -
A model to ensure tha integrity of user's data in the cloud
(الجامعة الإسلامية - غزة, 2014) -
Automated Complaint System Using Text Mining Techniques
(الجامعة الإسلامية - غزة, 2014)Complaints System is the system that manages the process of how organizations handle, manage, respond and report to client’s complaints. Manual organizing for large number of requests is extremely difficult, time consuming, ... -
Using opinion mining method for product improvement
(الجامعة الإسلامية - غزة, 2014) -
Melanoma Detection Using Mobile Technology and Feature-Based Classification Techniques
(الجامعة الإسلامية - غزة, 2014)Melanoma is one of the most dangerous types of skin cancer in terms of the ratio of death cases. Probability of death increases when it is diagnosed late. However, it is possible to treat melanoma successfully when diagnosed ... -
Filtering Features and Recommender Model For Messaging System of MOODLE FRMM
(الجامعة الإسلامية - غزة, 2014)E-learning systems are powerful way for enriching learning and teaching process. With the spread of this culture, there is a need for Learning management system as MOODLE, aTutor , canvas and Sakai. MOODLE allows students ... -
Free Viewpoint Video Based on Stitching Technique
(الجامعة الإسلامية - غزة, 2014)Image stitching is a technique used for creating one panoramic scene from multiple images. It is used in panoramic photography and video where the viewer can only scroll horizontally and vertically across the scene. However, ... -
Exploring Guidance for prevent aginst XSS attacks in open CMS
(الجامعة الإسلامية - غزة, 2014) -
implementing and comprising of otp techniques totp , hotp , crotp to prevent replay attack in radius protocol
(الجامعة الإسلامية - غزة, 2014) -
An Ontology-Based Approach to Model the Interconnections between Research Artifacts
(الجامعة الإسلامية - غزة, 2015)A huge amount of research artifacts (e.g. papers, journals) is published on the web, and there is an emerging need to link these artifacts in a suitable way. While this scholarly record represents a great source of knowledge, ... -
An Approach for Detecting and Preventing DoS Attacks in LAN
(الجامعة الإسلامية - غزة, 2015)Nowadays, Denial of service (DoS) attacks, have become a major security threat to networks and to the Internet, DoS is harmful to the networks as it delays legitimate users from accessing the server, usually services such ... -
A Two-Phase Snake Method for Object Segmentation against Background Clutter and Boundary Concavities
(الجامعة الإسلامية - غزة, 2015)Various object segmentation methods have been proposed based on the classical Active Contour Model (Snake), which has been used extensively to locate object boundaries in images. However, these methods have limited capability ... -
Wormhole Attack Detection and Prevention Model in MANET Based on Hop-Count and Localization
(الجامعة الإسلامية - غزة, 2015)Due to the nature of wireless transmission in Mobile Ad-Hoc Networks (MANET), has more security issues compared to wired networks. Among of all of these security issues, wormhole attack is considered to be a very serious ... -
An Ontology-Based Arabic Question Answering System
(الجامعة الإسلامية - غزة, 2015)Question Answering (QA) is a field that has been widely explored in previous research. However, research in Arabic QA is still limited and has not reached the same level of English QA due to the Arabic language specific ... -
Detecting Inactivity Segments in E-learning Video Recordings ( DISE )
(الجامعة الإسلامية - غزة, 2015)Lecture video recordings used in e-learning typically contain segments of inactivity which are better removed in order to save storage and bandwidth load, and to decrease viewing time and effort. This problem is also common ...